Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Elections.

The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other communication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems.

Author(s): Stuart Shapiro, Aaron Powell (auth.), Nikita Borisov, Ian Goldberg (eds.)
Series: Lecture Notes in Computer Science 5134
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2008

Language: English
Pages: 237
Tags: Data Encryption; Computer Communication Networks; Systems and Data Security; Information Storage and Retrieval; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Analyzing PETs for Enterprise Operations....Pages 1-1
Perfect Matching Disclosure Attacks....Pages 2-23
An Indistinguishability-Based Characterization of Anonymous Channels....Pages 24-43
On the Impact of Social Network Profiling on Anonymity....Pages 44-62
Shining Light in Dark Places: Understanding the Tor Network....Pages 63-76
Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover....Pages 77-98
Breaking and Provably Fixing Minx....Pages 99-114
Metrics for Security and Performance in Low-Latency Anonymity Systems....Pages 115-132
Studying Timing Analysis on the Internet with SubRosa....Pages 133-150
Bridging and Fingerprinting: Epistemic Attacks on Route Selection....Pages 151-166
Chattering Laptops....Pages 167-186
How to Bypass Two Anonymity Revocation Schemes....Pages 187-201
Reputation Systems for Anonymous Networks....Pages 202-218
PAR: Payment for Anonymous Routing....Pages 219-236
Back Matter....Pages -